DocumentCode :
2372466
Title :
The MITRE security perimeter
Author :
Goldberg, David S.
Author_Institution :
Mitre Corp., USA
fYear :
1994
fDate :
5-9 Dec 1994
Firstpage :
212
Lastpage :
218
Abstract :
To protect MITRE´s unclassified computing resources from unauthorized use, MITRE maintains a network firewall between the MITRE corporate network and the Internet, and limits dial-in to three modem pools. The firewall limits Internet connectivity to a small set of computer systems called boundary hosts. The boundary hosts and the modem pools use a smartcard-based user authentication scheme to ensure that only authorized MITRE employees can gain access to the corporate network. The combination of firewall, boundary hosts, and modem pools is known as the MITRE security perimeter. The paper describes the design of the security perimeter and the integration of the smartcard system into the boundary hosts and modem pools
Keywords :
Internet; authorisation; internetworking; smart cards; Internet connectivity; MITRE corporate network; MITRE security perimeter; authorized MITRE employees; boundary hosts; computer systems; corporate network; dial-in; modem pools; network firewall; smartcard system; smartcard-based user authentication scheme; unauthorized use; unclassified computing resources; Authentication; Computer networks; IP networks; Internet; Joining processes; LAN interconnection; Local area networks; Modems; Protection; TCPIP;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Computer Security Applications Conference, 1994. Proceedings., 10th Annual
Conference_Location :
Orlando, FL
Print_ISBN :
0-8186-6795-8
Type :
conf
DOI :
10.1109/CSAC.1994.367306
Filename :
367306
Link To Document :
بازگشت